Unrated severityNVD Advisory· Published Jul 19, 2014· Updated May 6, 2026
CVE-2014-4943
CVE-2014-4943
Description
The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.
Affected products
8- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*+ 2 more
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
22- github.com/torvalds/linux/commit/3cf521f7dc87c031617fd47e4b7aa2593c2f3dafnvdPatchThird Party Advisory
- linux.oracle.com/errata/ELSA-2014-0924.htmlnvdThird Party Advisory
- linux.oracle.com/errata/ELSA-2014-3047.htmlnvdThird Party Advisory
- linux.oracle.com/errata/ELSA-2014-3048.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.htmlnvdMailing ListThird Party Advisory
- openwall.com/lists/oss-security/2014/07/17/1nvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1025.htmlnvdThird Party Advisory
- secunia.com/advisories/59790nvdThird Party Advisory
- secunia.com/advisories/60011nvdThird Party Advisory
- secunia.com/advisories/60071nvdThird Party Advisory
- secunia.com/advisories/60220nvdThird Party Advisory
- secunia.com/advisories/60380nvdThird Party Advisory
- secunia.com/advisories/60393nvdThird Party Advisory
- www.debian.org/security/2014/dsa-2992nvdThird Party Advisory
- www.exploit-db.com/exploits/36267nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1030610nvdThird Party AdvisoryVDB Entry
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/94665nvdThird Party AdvisoryVDB Entry
- osvdb.org/show/osvdb/109277nvdBroken Link
News mentions
0No linked articles in our index yet.